scholarly journals Steganografi Pada Digital Image Menggunakan Metode Least Significant Bit Insertion

2019 ◽  
Vol 1 (1) ◽  
pp. 73
Author(s):  
Siti Nur’aini

<span lang="SV">Steganography is a way to hide messages or confidential data in a medium called a carrier file. Embedding is done by the Least Significant Bit Insertion method, which is to replace the lowest bit of Red Green Blue (RGB) each pixel with the data bit you want to insert. With this method the difference between pixels that have not been pasted by messages and pixels that have been pasted by messages cannot be distinguished by human eye sight. Because the LSB insertion method is used, it is necessary to consider the type of digital image format used, this is necessary to avoid the loss of messages when extracting. And the best digital image format used is the 24-bit BMP because the BMP format is lossless compression</span>

Author(s):  
Randi Rian Putra ◽  
Meika Sari ◽  
Andysah Putera Utama Siahaan ◽  
Muhammad Iqbal

The development of information technology today, makes it easier for perpetrators of computer crime, by abusing technology to support its activities, where their activities significantly disrupt someone's privacy. In this paper the insertion of text messages with the least significant bit method. Therefore the administrator needs a system or application that is safe so that it can make it difficult for computer criminals to carry out their activities, and help technology users regarding securing the accessed data bit, which is expected to increase the security of a secret text message. To increase the security of the data to be stored, the data stored is embedded in other media. Least Significant Bit is one method that can be used to hide confidential data on images or media. With this method, the confidentiality of information will be more secure.


Author(s):  
Iryna Victorivna Brysina ◽  
Victor Olexandrovych Makarichev

In this paper, we consider the problem of digital image compression with high requirements to the quality of the result. Obviously, lossless compression algorithms can be applied. Since lossy compression provides a higher compression ratio and, hence, higher memory savings than lossless compression, we propose to use lossy algorithms with settings that provide the smallest loss of quality. The subject matter of this paper is almost lossless compression of full color 24-bit digital images using the discrete atomic compression (DAC) that is an algorithm based on the discrete atomic transform. The goal is to investigate the compression ratio and the quality loss indicators such as uniform (U), root mean square (RMS) and peak signal to noise ratio (PSNR) metrics. We also study the distribution of the difference between pixels of the original image and the corresponding pixels of the reconstructed image. In this research, the classic test images and the classic aerial images are considered. U-metric, which is highly dependent on even minor local changes, is considered as the major metric of quality loss. We solve the following tasks: to evaluate memory savings and loss of quality for each test image. We use the methods of digital image processing, atomic function theory, and approximation theory. The computer program "Discrete Atomic Compression: User Kit" with the mode "Almost Lossless Compression" is used to obtain results of the DAC processing of test images. We obtain the following results: 1) the difference between the smallest and the largest loss of quality is minor; 2) loss of quality is quite stable and predictable; 3) the compression ratio depends on the smoothness of the color change (the smallest and the largest values are obtained when processing the test images with the largest and the smallest number of small details in the image, respectively); 4) DAC provides 59 percent of memory savings; 5) ZIP-compression of DAC-files, which contain images compressed by DAC, is efficient. Conclusions: 1) the almost lossless compression mode of DAC provides sufficiently stable values of the considered quality loss metrics; 2) DAC provides relatively high compression ratio; 3) there is a possibility of further optimization of the DAC algorithm; 4) further research and development of this algorithm are promising.


2018 ◽  
Author(s):  
Andysah Putera Utama Siahaan

The development of information technology today, makes it easier for perpetrators of computer crime, by abusing technology to support its activities, where their activities significantly disrupt someone's privacy. In this paper the insertion of text messages with the least significant bit method. Therefore the administrator needs a system or application that is safe so that it can make it difficult for computer criminals to carry out their activities, and help technology users regarding securing the accessed data bit, which is expected to increase the security of a secret text message. To increase the security of the data to be stored, the data stored is embedded in other media. Least Significant Bit is one method that can be used to hide confidential data on images or media. With this method, the confidentiality of information will be more secure.


Respati ◽  
2018 ◽  
Vol 13 (3) ◽  
Author(s):  
Achmad Ardiansyah ◽  
Mepa Kurniasih

INTISARI Pesan merupakan hasil dari pengolahan data menjadi bentuk yang lebih berguna bagi yang menerimanya yang menggambarkan suatu fakta yang digunakan sebagai alat bantu untuk pengambilan suatu keputusan. Sangat pentingnya isi pesan yang menyebabkan pesan hanya boleh diakses oleh orang-orang tertentu. Pesan yang merupakan aset bernilai seharusnya dilindungi agar aman. Steganografi adalah seni dan ilmu menulis pesan tersembunyi atau menyembunyikan pesan dengan suatu cara sehingga selain si pengirim dan si penerima, tidak ada seorangpun yang mengetahui atau menyadari bahwa ada suatu pesan rahasia. Pesan yang dapat disembunyikan berupa teks, gambar, suara, dan video.Melindungi pesan yang dirahasiakan dari orang yang tidak berhak salah satunya adalah teknik steganografi yang dapat menyembunyikan data rahasia. Teknik steganografi menggunakan metode Least Significant Bit (LSB) untuk memodifikasi bit-bit yang termasuk bit LSB pada setiap byte warna pada sebuah pixel citra digital. Bit-bit LSB ini akan dimodifikasi dengan menggantikan setiap LSB yang ada dengan bit-bit informasi lain yang ingin disembunyikan. Dengan adanya citra digital kita bisa memanfaatkan utuk menyisipkan pesan pada citra digital tersebut. Hasil penelitian menunjukkan bahwa semakin besar ukuran pixel citra dan jumlah karakter, maka akan semakin lama proses penyisipan dan ekstraksinya. Dengan stego-image yang diperoleh secara citra digital memiliki tampilan hampir sama sehingga tidak terlihat oleh sistem penglihatan manusia.Kata Kunc – Citra Digital, Least Significant Bit (LSB),  Steganografi , Pesan ABSTRACTMessage is the result of processing data into a form that is more useful for those who receive it which describes a fact that is used as a tool for making a decision. The importance of the contents of messages causes messages to only be accessed by certain people. Messages that are valuable assets should be protected to be safe. Steganography is the art and science of writing hidden messages or hiding messages in a way so that in addition to the sender and the recipient, no one knows or realizes that there is a secret message. Messages that can be hidden are in the form of text, images, sounds, and videos.Protecting confidential messages from unauthorized people is one of the Steganography Techniques that can hide confidential data. The steganography technique uses the LSB (Least Significant Bit) method to modify the bits including the LSB bit on each color byte in a digital image pixel. These LSB bits will be modified by replacing each existing LSB with other bits of information that you want to hide. With the presence of digital images we can use to insert messages in the digital image. The results of the study show that the larger the pixel size of the image and the number of characters, the longer the insertion process and its extraction will be. With stego-image obtained by digital imagery it has almost the same appearance so it is not visible to the human visual system.Keywords — Digital Image, Least Significant Bit (LSB), Steganography, Message


Author(s):  
Jiamin Li ◽  
Xiaoping Chen ◽  
Jiliang Ma ◽  
Cai Liang

AbstractTraditional methods for measuring the residence time distribution (RTD) of particles in a fluidized bed are complex and time-consuming. To this regard, the present work proposes a new measurement method with remarkable efficiency based on digital image analysis. The dyed tracers are recognized in the images of the samples due to the difference of colors from bed materials. The HSV and the well-known RGB color space were employed to distinguish the tracers. By enhancing the Saturation and the Value in HSV and adjusting the gray range of images, the recognition error is effectively reduced. Then the pixels representing the tracers are distinguished, based on which the concentration of the tracers and RTD are measured. The efficiency, accuracy and repeatability of the method were validated by RTD measurements experiments. The method is also fit for distinguishing the target particles from multi-component systems consisting of particles of different colors.


2019 ◽  
Vol 7 (4) ◽  
pp. 254
Author(s):  
Nada E. Tawfiq

Image files can hide text without their size being affected too much. This process called steganography which allows hiding text in images without any suspicions from intruders. This paper addresses an improved LSB substitution algorithm for hiding Kurdish text information written in text file into digital image as steganography technique. The algorithm consists of two main phases, the first phase holds the encryption of the Kurdish text message and the embedded technique while the second phase hold the message extraction followed by decryption to get the original code of each character. The algorithm contains many procedures to enhance this process. Least Significant Bit method is used to hide the Kurdish text, in order to keep the features and characteristics of the original image. Applying the proposed approach shows that it seems work in a best case by hiding and retrieving text from the digital image which is used as a carrier of this text. Delphi 2010 was used to simulate both encrypt-embedded phase and extract-decrypt phase, and the results were obtained with high and security which proved the efficiency of the algorithm, where the hidden Kurdish text didn’t make any distortion or change over the cover image.


2020 ◽  
Vol 1 (3) ◽  
pp. 284
Author(s):  
Josua Alfiandi Sinuhaji

Digital imagery is currently very widely used, so it is very vulnerable to data theft by unauthorized parties. In order to maintain the security of digital images can be done by using cryptographic techniques. Cryptographic techniques can encode digital images by encrypting them in the form of passwords that are not understood. ICE is a block cipher published by Kwan in 1997. This algorithm has a structure similar to DES, but with additional bit permutations that do not depend on the key in the rotation function. There are various types of ICE variants, namely Thin-ICE, ICE standard, and ICE-n. The difference between the three is the length of the keyword used and the number of rounds. The Thin-ICE algorithm uses 64 bits and 8 turns. The ICE standard uses 64 bits and 16 round keys. The ICE-n algorithm uses keys 64n bits and 16n turns. The use of this type of algorithm can be adjusted to the needs of users where Thin-ICE has the lowest level of security among the three, while ICE-n is the highest. This algorithm does not become the subject of a patent and the source code can be used freely.Keywords : Cryptography, Digital Image,Algorithm,ICE.


2020 ◽  
Vol 29 (1) ◽  
pp. 30-39 ◽  
Author(s):  
Farah Deeba ◽  
She Kun ◽  
Fayaz Ali Dharejo ◽  
Hira Memon

2020 ◽  
Vol 10 (3) ◽  
pp. 836 ◽  
Author(s):  
Soo-Mok Jung ◽  
Byung-Won On

In this paper, we proposed methods to accurately predict pixel values by effectively using local similarity, curved surface characteristics, and edge characteristics present in an image. Furthermore, to hide more confidential data in a cover image using the prediction image composed of precisely predicted pixel values, we proposed an effective data hiding technique that applied the prediction image to the conventional reversible data hiding technique. Precise prediction of pixel values greatly increases the frequency at the peak point in the histogram of the difference sequence generated using the cover and prediction images. This considerably increases the amount of confidential data that can be hidden in the cover image. The proposed reversible data hiding algorithm (ARDHA) can hide up to 24.5% more confidential data than the existing algorithm. Moreover, it is not possible to determine the presence of hidden confidential data in stego-images, as they possess excellent visual quality. The confidential data can be extracted from the stego-image without loss, and the original cover image can be restored from the stego-image without distortion. Therefore, the proposed algorithm can be effectively used in digital image watermarking, military, and medical applications.


Sign in / Sign up

Export Citation Format

Share Document